Computer Security Institute

Results: 1676



#Item
851Cyberwarfare / Computer law / Federal Information Security Management Act / National Institute of Standards and Technology / Security controls / Certification and Accreditation / Information security / Federal Information Processing Standard / Vulnerability / Computer security / Security / Data security

U.S. DEPARTMENT OF COMMERCE Office of Inspector General National Institute of Standards and Technology FY 2009 FISMA Assessment of

Add to Reading List

Source URL: www.oig.doc.gov

Language: English - Date: 2014-11-14 16:18:31
852Gaithersburg /  Maryland / Security / Data security / Advanced Technology Program / Government Performance and Results Act / Information security / Performance measurement / Public safety / Government / Standards organizations / Computer security / National Institute of Standards and Technology

U.S. DEPARTMENT OF COMMERCE Office of Inspector General NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Reporting of Performance Measures

Add to Reading List

Source URL: www.oig.doc.gov

Language: English - Date: 2014-11-03 12:39:43
853Security / Cyber-physical system / Electronic warfare / Military technology / Vulnerability / International Multilateral Partnership Against Cyber Threats / Hacking / Computer security / Cyberwarfare

Designed-In Cyber Security for Cyber-Physical Systems Workshop Report by the Cyber Security Research Alliance 4-5 April 2013 in Gaithersburg, Maryland Co-sponsored with the National Institute of Standards and Technology

Add to Reading List

Source URL: www.cybersecurityresearch.org

Language: English - Date: 2013-08-30 11:50:47
854Computer network security / Tunneling protocols / Email / Worcester Polytechnic Institute / Microsoft Outlook / Password / Outlook Web App / Cisco Systems VPN Client / Shared resource / Computing / Calendaring software / Personal information managers

WORKING FROM OFF-CAMPUS: USING A WINDOWS COMPUTER CONNECTED TO HOME NETWORK Please consult the HOME NETWORK STANDARD for computer and data security information. http://www.wpi.edu/academics/CCC/Policies/homenet.html Acce

Add to Reading List

Source URL: www.wpi.edu

Language: English - Date: 2014-05-13 12:53:11
855System software / Cyberwarfare / Data security / Iptables / Transmission Control Protocol / Firewall / Wireless security / Port scanner / Password / Computer network security / Computer security / Computing

National Institute of Electronics & Information Technology NIELIT Gorakhpur Centre (Formerly DOEACC Society, Gorakhpur Centre) CERTIFICATION SCHEME IN INFORMATION SECURITY (LEVEL2) CERTIFIED SYSTEM SECURITY PROFESSIONAL

Add to Reading List

Source URL: www.nielitgkp.edu.in

Language: English - Date: 2012-05-25 06:16:05
856Federal Information Security Management Act / National Institute of Standards and Technology / Computing / Information security / Public safety / Cyber-security regulation / NIST Special Publication 800-53 / Computer security / Security / Computer law

INFORMATION SECURITY AND PRIVACY ADVISORY BOARD _____________________________ Established by the Computer Security Act of[removed]Amended by the Federal Information Security Management Act of[removed]September 15, 2004

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
857Security / Software testing / Hacking / Vulnerability / Social vulnerability / Vulnerability management / Federal Information Security Management Act / Computer security / Risk / Cyberwarfare

  Vulnerability  Assessment  Policy     Created by or for the SANS Institute. Feel free to modify or use for your organization. If you have a policy to contribute, please send e-mail to

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-10-09 13:45:21
858Secure Shell / Proxy server / Password / Firewall / Linux / Man-in-the-middle attack / Transmission Control Protocol / Computing / Computer network security / Internet privacy

National Institute of Electronics & Information Technology NIELIT Gorakhpur Centre (Formerly DOEACC Society, Gorakhpur Centre) CERTIFICATION SCHEME IN INFORMATION SECURITY (LEVEL1) CERTIFIED SYSTEM SECURITY ANALYST (CSS

Add to Reading List

Source URL: www.nielitgkp.edu.in

Language: English - Date: 2012-05-25 06:16:13
859Computer security / Crime prevention / Public safety / United States Department of Veterans Affairs / Data security / Competence / Security awareness / Oregon Institute of Technology / Information security / Human resource management / Security / Management

Terri Cinnamon is the Director of Information Technology Workforce Development (ITWD) for the Office of Information and Technology (OIT) at the Department of Veterans Affairs (VA). A graduate from Wheeling Jesuit Univers

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-09-19 00:38:00
860Hoboken /  New Jersey / Middle States Association of Colleges and Schools / Stevens Institute of Technology / National Virtual Observatory / Cryptography / Computer security / Knowledge / Science / Security / Association of Independent Technological Universities

Susanne Wetzel is an Associate Professor at the Computer Science Department of the Stevens Institute of Technology. She first joined the faculty at Stevens as Assistant Professor in[removed]She received her Diplom in Compu

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-09-21 15:05:00
UPDATE